UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
S_IOT_Intro.pptx
1. Security in IoT System
(1726206)
Introduction
Rutika Ghariya
Assistant Professor
GTU-Graduate School of Engineering and Technology
(Email: ap_rutika@gtu.edu.in)
2. Rationale
• an overview of the Internet of Things (IoT) system in terms of
security
• current security risks, the challenges that the IoT domain
faces, and the available countermeasures for known issues.
3. About Units (Chapters):
Sr. No. Topic (Unit) % Weightage
1 Internet of Things: Privacy, Security and Governance
Introduction, Overview of Governance, Privacy and
Security Issues, Contribution from FP7 Projects, Security,
Privacy and Trust in IoT-Data-Platforms for Smart Cities,
First Steps Towards a Secure Platform, Smartie
Data Aggregation for the IoT in Smart Cities, Security
10%
2 IOT- Security Overview
IOT Reference Model – Introduction - Functional View,
IoT Security Challenges-Hardware Security Risks -
Hardcoded/Default Passwords - Resource Constrained
Computations -Legacy Assets Connections - Devices
Physical Security, Software Security Risks -Software
Vulnerabilities
20%
5. Continue….. About Units (Chapters):
Sr. No. Topic (Unit) % Weightage
6 Securing Internet of Things Environment
IoT Hardware –Test Device Range-Latency and Capacity
– Manufacturability Test –Secure from Physical Attacks,
IoT Software – Trusted IoT Application Platforms, -
Firmware Updating –Network Enforced Policy –Secure
Analytics Visibility and Control
20%
7 Cloud Computing Security Issues
Infrastructure Security: The Network Level, The Host
Level, The Application Level, Data Security and Storage,
Aspects of Data Security, Data Security Mitigation
Provider Data and Its Security, Cloud Authorization
Management
10%
6. Course Outcome :
After completion of course, students will be able to::
CO 1726206.1 To Understand security and privacy issues in IoT
CO 1726206.2
Find vulnerabilities that endanger internet of things
devices and infrastructure.
CO 1726206.3
Examine different kinds of IoT attacks that could harm
IoT environment
CO 1726206.4
Analyze different IoT protocols and their security
measures.
CO 1726206.5 Figure out how to secure an IoT environment
7. Reference Books
• Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on-
Approach)”, Orient Blackswan Private Limited - New Delhi, 2015 1st
Edition,
• Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach
to Connecting Everything”, 1st Edition, Apress Publications, 2014
• Cuno Pfister, Getting Started with the Internet of Things, O’Reilly Media,
2011, ISBN: 978-1- 44939357-1
8. List of Laboratory/Learning Resources
Required:
• List of Hardware:- High Performance Computer Systems
• List of Open Source Tools/Simulator: IoT Toolkit (smart object API
gateway service reference implementation), Zetta (Based on Node.js,
Zetta can create IoT servers that link to various devices and sensors)
• List of Useful websites/MOOCs: https://www.cse.wustl.edu/~jain/cse570-
15/ftp/iot_prot/index.html https://www.postscapes.com/internet-of-
things-protocols